Business Consulting BlogVeritas Consulting LLC is a full service consulting firm to help your business or medical office prevent security threats. https://www.veritasconsultinggroup.com/blogLatest Virus Aggressively Targeting Healthcare Industry in 2017https://www.veritasconsultinggroup.com/blog/PostId/4/latest-virus-aggressively-targeting-healthcare-industry-in-2017General Practice Office,HIPAA Violations Security BreachTue, 18 Apr 2017 11:30:00 GMT<h1>Latest Virus Aggressively Targeting Healthcare Industry in 2017</h1> <div><br /> </div> <h2>Amateur hackers are going after hospitals and general practices at record levels using a virus named Philadelphia.&nbsp;</h2> <p>Philadelphia is a part of a ransomware spear phishing campaign geared to be a huge threat your medical facility regardless of size or location.&nbsp;</p> <p>&nbsp;</p> <h3>What is spear phishing?&nbsp;</h3> <p>Spear phishing is the fraudulent practice of sending emails seemingly from a known and trusted sender that will encourage recipients to unknowingly reveal confidential information. </p> <p>&nbsp;</p> <h3>What is Philadelphia?&nbsp;</h3> <p>Philadelphia was designed so that even the least experienced cybercriminal can give it a hack. These program is so slick, that the attack is unrecognizable until it is too late. Simply double clicking an icon will activate JavaScript to download your network. Scary!&nbsp; </p> <p>Usually, when you hear of a cyberattack at a large hospital corporation, most people would assume this virus was highly advanced and stealthy. Philadelphia is quite the opposite. With the lack of sophistication, hackers find that keeping it simple is an advantage.&nbsp; </p> <p>&nbsp;</p> <h3>How does Philadelphia get on my computer?&nbsp;</h3> <p>Philadelphia, like many other ransomware virus, becomes a threat when a seemingly trusted email is received and attachments are opened. In a general practice office, receiving patient records is nothing out of the norm.&nbsp; </p> <p>Ransomware contains icons similar to patient information. You could also receive an email from someone appearing to be another physician&rsquo;s office with an attached file, a medical record, for example. You or your staff opens it, and ransomware installs. </p> <p>While it is usual that those with the least IT experience, like your receptionist, to be easily targeted, this particular virus targets those with the highest security privileges.&nbsp; </p> <p>&nbsp;</p> <h3>How do they know who has the highest security privileges?&nbsp;</h3> <p>This type of information is easily gathered. A great deal of people have their job and title listed on their Facebook account, and other online social platforms. When people are proud of where they work, they proudly display it on social media. Doctors go to school for many years, so that MD or PhD is proudly wore. </p> <p>&nbsp;Why not show it off?&nbsp;</p> <p>While removing your profile information is probably the smartest thing to do, you can simply change the audience settings on your profile to friends only. You&rsquo;ll want to watch who you add as a friend.&nbsp; </p> <h3>How do I know if Philadelphia is on my computer?</h3> <p>Once Philadelphia is downloaded onto your computer, you will know. . A screen will open encrypting all of your patient files and any other records in your database. It will demand a &ldquo;ransom&rdquo; before it provides you with the decryption key. Ransom is usually requested in the form of Bitcoin. If this happens to you, DO NOT PAY!! There is away around this. <a href="http://www.veritasconsultinggroup.com/LinkClick.aspx?link=%2fContact-Us&amp;tabid=398&amp;portalid=5&amp;mid=1662" target="_blank">Contact us</a> and we will help you remove this virus for you.&nbsp; </p> <p>If you are familiar with viruses or ransomware, you may have heard of Stampado. Philadelphia is updated version of that virus. Through some investigation of this virus, we located a YouTube video on how to use Philadelphia. The ease of use is quite frightening.&nbsp; </p> <h3>How can I prevent this from happening?</h3> <p>Make sure you have the preventative measures in place, including education of your staff. Veritas Consulting, LLC, will evaluate your current system and show you any threats you may be vulnerable to and show you how to prevent it. We will educate you and your staff and keep you up-to-date with current threats.&nbsp;<br /> <a href="http://www.veritasconsultinggroup.com/LinkClick.aspx?link=%2fContact-Us&amp;tabid=398&amp;portalid=5&amp;mid=1662" target="_blank">Contact us</a> TODAY to learn more!</p> <div><br /> </div>4Second Largest HIPAA Fine to date is $5.5 Million!https://www.veritasconsultinggroup.com/blog/PostId/2/second-largest-hipaa-fine-to-date-is-55-millionHIPAA Violations ,Security BreachTue, 28 Mar 2017 17:29:45 GMT<h1>Second Largest HIPAA Fine to date is $5.5 Million!</h1> According to a recent article on tripwire.com, on February 16, 2017, the Office of Civil Rights has issued a cumbersome fine for failure to comply with audit procedures. Memorial Healthcare System, who was fined an astounding $5.5 million, failed to meet the terms by disregarding of review, modification, and even the termination of users&rsquo; access.&nbsp; <div><br /> &nbsp; <p>By avoiding these terms with, what could have been, avoidable HIPAA violations, more than 100,000 patients had their records impermissibly disclosed! &nbsp;</p> <p > MHS settled their agreement with a substantial corrective action plan and landed the second largest fine to any entity. The largest fine was came just a few months ago in August 2016 at a whopping $5.55 million!&nbsp; </p> <h3>What you should know about MHS</h3> <p>&bull;<span class="Apple-tab-span"> </span>4th largest public healthcare system in the United States of America<br /> &bull;<span class="Apple-tab-span"> </span>Participant in OHCA (Organized Health Care Arrangement) with a network of physicians&rsquo; offices</p> <h3>What is OHCA?&nbsp;</h3> <p>The Organized Health Care Arrangement allows covered entities from affiliated offices to access EHR records. This arrangement allows cross serving for patients where employees of the physician&rsquo;s office to access a patients record from another office in the network. This type of arrangement was designed to improve patient care through access.&nbsp; </p> <p>As a participant in OHCA, entities are require to conform to their HIPAA based requirements.&nbsp; </p> <h3>What happened at MHS that you need to know?</h3> <p>MHS submitted a breach report in 2012 regarding two employees who wrongfully accessed patient records. Three months after the initial breach report, MHS reported an additional 12 users also accessed the patient ePHI (electronic Protected Health Information).</p> <p>Ultimately, MHS failed to follow their own polices to deactivate login credentials of former employees at the affiliated physicians offices. The same credentials were used for a year gaining access to the data over and over again.&nbsp; </p> <p>This inexcusable and inappropriate access resulted in federal criminal charges from the pertinent patient information being sold as well as fraudulent tax returns. &nbsp; &nbsp; </p> <h3>The Settlement</h3> <p>This particular case is the first forceful enforcement action against a company for failing to terminate user access controls. This case showed a pattern of complete disregard for monitoring and auditing user access. There were risk analysis reporting this very issue over the course of five years reporting this very issue.&nbsp;<br /> This large settlement certainly sets a tone for others who must comply with HIPAA&rsquo;s compliance program. MHS could have easily avoided these risks by implementing and auditing the already established policies and procedures, terminating user controls on a routine basis and verifying they no longer have access, and conform to the risk analysis.&nbsp;</p> <p><a href="http://www.veritasconsultinggroup.com/LinkClick.aspx?link=%2fContact-Us&amp;tabid=398&amp;portalid=5&amp;mid=1662" target="_blank">Contact</a> Veritas to consult and identify what measures you may be missing.&nbsp;</p> <div><br /> </div> <br /> </div>2